咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 194 篇 期刊文献

馆藏范围

  • 590 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 393 篇 工学
    • 199 篇 计算机科学与技术...
    • 159 篇 软件工程
    • 147 篇 信息与通信工程
    • 111 篇 电子科学与技术(可...
    • 56 篇 电气工程
    • 46 篇 仪器科学与技术
    • 43 篇 控制科学与工程
    • 37 篇 光学工程
    • 32 篇 生物工程
    • 30 篇 机械工程
    • 19 篇 材料科学与工程(可...
    • 18 篇 网络空间安全
    • 16 篇 土木工程
    • 14 篇 安全科学与工程
    • 13 篇 建筑学
    • 13 篇 化学工程与技术
    • 12 篇 动力工程及工程热...
    • 11 篇 生物医学工程(可授...
  • 202 篇 理学
    • 104 篇 数学
    • 68 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 34 篇 生物学
    • 18 篇 化学
    • 16 篇 系统科学
  • 62 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 14 篇 军事学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
    • 10 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 9 篇 法学
  • 4 篇 农学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 22 篇 feature extracti...
  • 18 篇 deep learning
  • 16 篇 simulation
  • 16 篇 cognitive radio
  • 13 篇 bandwidth
  • 13 篇 modulation
  • 11 篇 object detection
  • 11 篇 neural networks
  • 11 篇 accuracy
  • 11 篇 training
  • 10 篇 security
  • 9 篇 signal to noise ...
  • 9 篇 metamaterials
  • 9 篇 optimization
  • 9 篇 clustering algor...
  • 9 篇 heuristic algori...
  • 8 篇 graphics process...
  • 8 篇 interference
  • 8 篇 computational mo...
  • 8 篇 algorithm design...

机构

  • 180 篇 science and tech...
  • 66 篇 science and tech...
  • 43 篇 science and tech...
  • 16 篇 institute of cyb...
  • 14 篇 no.36 research i...
  • 13 篇 the 36th researc...
  • 12 篇 dept. of microwa...
  • 11 篇 science and tech...
  • 11 篇 college of infor...
  • 10 篇 science and tech...
  • 9 篇 beijing aerospac...
  • 9 篇 college of under...
  • 9 篇 school of commun...
  • 8 篇 the science and ...
  • 7 篇 school of inform...
  • 7 篇 science and tech...
  • 7 篇 university of el...
  • 7 篇 school of comput...
  • 6 篇 no.36 research i...
  • 6 篇 college of scien...

作者

  • 23 篇 yang xiaoniu
  • 23 篇 hua jun
  • 19 篇 xiaoniu yang
  • 17 篇 wu qun
  • 16 篇 xuan qi
  • 14 篇 shilian zheng
  • 13 篇 zheng shilian
  • 13 篇 zhu huijie
  • 11 篇 wang lijun
  • 11 篇 lijun wang
  • 11 篇 huijie zhu
  • 10 篇 wang wei
  • 10 篇 xiaofeng xu
  • 9 篇 huaji zhou
  • 9 篇 yong zhang
  • 9 篇 jiahao dai
  • 8 篇 dai jiahao
  • 8 篇 weiguo shen
  • 8 篇 wei wang
  • 7 篇 wang yiteng

语言

  • 551 篇 英文
  • 23 篇 中文
  • 16 篇 其他
检索条件"机构=Science and Technology on Commuication Information Security Control Laboratory"
590 条 记 录,以下是491-500 订阅
排序:
Robust two-factor authentication and key agreement preserving user privacy
收藏 引用
International Journal of Network security 2014年 第3期16卷 229-240页
作者: Jiang, Qi Ma, Jianfeng Li, Guangsong Yang, Li School of Computer Science and Technology Xidian University No.2 South Taibai Road Xi'an Shaanxi 710071 China Science and Technology on Communication Information Security Control Laboratory 36 Research Institute CETC Jiaxing 314033 China Department of Information Research Zhengzhou Information Science and Technology Institute No.5 Wenhua Road Zhengzhou Henan 450002 China
In this paper, we first give a new set of design goals for anonymous two-factor authentication scheme. The new set is a refinement of some previously proposed requirement sets;it not only eliminates the redundancies, ... 详细信息
来源: 评论
A secure model based on game theoretic malicious detection mechanism for MANETs
收藏 引用
Journal of information and Computational science 2014年 第2期11卷 481-491页
作者: Wang, Xiao Feng, Renjian Wu, Yinfeng Ren, Yongji Wan, Jiangwen School of Instrumentation Science and Opto-Electronics Engineering Beihang University Beijing 100191 China Department of Command Naval Aeronautical and Astronautical University Yantai 264001 China Science and Technology on Communication Information Security Control Laboratory Jiaxing 314033 China
Mobile Ad Hoc network security is facing tougher challenges due to emerging purposive strategic attacks conducted by smart malicious nodes. All these purposive strategic attacks run out of the throughput which results... 详细信息
来源: 评论
Spectrum leasing and relay selection in multiuser cooperative cognitive radio networks
收藏 引用
Journal of Communications 2014年 第3期9卷 198-207页
作者: Tang, Yi Grace, David Wang, Lijie College of Electronic Science and Engineering National University of Defense Technology Hunan 410073 China Science and Technology on Information System Security Laboratory China Department of Electronics University of York York YO10 5DD United Kingdom Beijing Aerospace Control Center Beijing China
In this paper, we consider multiple primary and multiple secondary users cooperative cognitive radio networks, in which the primary users (PUs) lease a portion of their spectrum to the secondary users (SUs) for some r... 详细信息
来源: 评论
Passive satellite localization using TDOA/FDOA/AOA measurements
Passive satellite localization using TDOA/FDOA/AOA measureme...
收藏 引用
2013 IEEE Conference Anthology, ANTHOLOGY 2013
作者: Bin, Yang Zheng Lei, Wang Qun, Chen Pei Nan, Lu An Science and Technology on Communication Information Security Control Laboratory Jiaxing Zhejiang 314033 China
Dual satellite TDOA/FDOA localization scheme has problems of multiple ambiguous solutions and poor localization results in the sub-satellite area along the dual satellite baseline direction. Passive localization using... 详细信息
来源: 评论
An octree-based proxy for collision detection in large-scale particle systems
收藏 引用
science China(information sciences) 2013年 第1期56卷 55-64页
作者: FAN WenShan WANG Bin PAUL Jean-Claude SUN JiaGuang School of Software Tsinghua University Beijing Aerospace Control Center Department of Computer Science and Technology Tsinghua University Key Laboratory for Information System Security Ministry of Education of China Tsinghua National Laboratory for Information Science and Technology Institut National de Recherche en Informatique et en Automatique(INRIA)
Particle systems are important building block for simulating vivid and detail-rich effects in virtual *** of the most difficult aspects of particle systems has been detecting collisions between particles and mesh *** ... 详细信息
来源: 评论
Critical nodes selection based on trust evaluation in Ad Hoc networks
收藏 引用
Tongxin Xuebao/Journal on Communications 2014年 35卷 213-219页
作者: Liu, Zhuo-Chao Yang, Li Jiang, Qi Wang, Wei Cao, Chun-Jie School of Computer Science and Technology Xidian University Xi'an710071 China Science and Technology on Communication Information Security Control Laboratory The 36th Research Institute of CETC Jiaxing314033 China College of Information Science and Technology Hainan University Haikou570228 China
There are some critical nodes in Ad Hoc networks, and the failure of these critical nodes can critically affect the performance of the network. For the aim of selecting the important and trusted critical nodes in Ad H... 详细信息
来源: 评论
Lidar echo characteristics analysis for stepped terrain
Lidar echo characteristics analysis for stepped terrain
收藏 引用
8th International Symposium on Precision Engineering Measurements and Instrumentation
作者: Jia, Yudong Zhang, Xiaoqing Lv, Yong Lang, Xiaoping School of Instrument Science and Opto-electronics Engineering Beijing Information Science and Technology University Beijing 100192 China Science and Technology on Electro-Optical Information Security Control Laboratory Sanhe 065201 China
According to the gridded discrete processing method, the laser echo characteristics in the case of ladder terrain ground are analyzed theoretically, and the ladder-like terrain echo mathematical model are established.... 详细信息
来源: 评论
Micro-hole fabrication based on focus-shaped radially polarized beams
Micro-hole fabrication based on focus-shaped radially polari...
收藏 引用
8th International Symposium on Precision Engineering Measurements and Instrumentation
作者: Du, Furong Zhou, Zhehai Zhang, Xiaoqing Zhu, Lianqing Beijing Engineering Research Center of Optoelectronic Information and Instruments Beijing Information Science and Technology University Beijing 100192 China Science and Technology on Electro-Optical Information Security Control Laboratory Sanhe 065201 China
A micro-hole fabrication scheme based on focus-shaped radially polarized beams is presented. First, a micro-hole fabrication system is demonstrated based on the focus shaping of radially polarized beams, where a high ... 详细信息
来源: 评论
Adaptively secure key-policy ABE scheme with fast decryption
收藏 引用
Tongxin Xuebao/Journal on Communications 2014年 35卷 26-32页
作者: Li, Qi Ma, Jian-Feng Xiong, Jin-Bo Liu, Xi-Meng School of Computer Science and Technology Xidian University Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an710071 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China Faculty of Software Fujian Normal University Fuzhou350108 China School of Telecommunication Engineering Xidian University Xi'an710071 China
In the existing adaptively secure ABE (attribute-based encryption) schemes, the decryption cost goes linearly with the number of attributes that are used in decryption. An adaptively secure key-policy ABE (FKP-ABE) sc... 详细信息
来源: 评论
Generation of cylindrical vector beams with a cat-eye cavity laser and a Mach-Zehnder interferometric arrangement
Generation of cylindrical vector beams with a cat-eye cavity...
收藏 引用
8th International Symposium on Precision Engineering Measurements and Instrumentation
作者: Xiao, Baoling Hu, Zhaohui Zhou, Zhehai Zhang, Shulian Yang, Jie Wang, Xiaoling Zhu, Lianqing Beijing Engineering Research Center of Optoelectronic Information and Instruments Beijing Information Science and Technology University Beijing 100192 China Science and Technology on Inertial Laboratory School of Instrumentation Science and Optoelectronic Engineering Beihang University Beijing 100191 China State Key Laboratory of Precision Measurement Technology and Instruments Tsinghua University Beijing 100084 China Science and Technology on Electro-Optical Information Security Control Laboratory Sanhe 065201 China
A novel method to generate cylindrical vector beams is presented based on a cat-eye cavity laser and a Mach-Zehnder interferometric arrangement. Some transverse modes can be generated by the cat-eye cavity laser and t... 详细信息
来源: 评论